From owner-freebsd-questions@FreeBSD.ORG Wed Feb 14 05:00:37 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 295E116A408 for ; Wed, 14 Feb 2007 05:00:37 +0000 (UTC) (envelope-from wblock@wonkity.com) Received: from wonkity.com (wonkity.com [67.158.26.137]) by mx1.freebsd.org (Postfix) with ESMTP id E6C7113C491 for ; Wed, 14 Feb 2007 05:00:36 +0000 (UTC) (envelope-from wblock@wonkity.com) Received: from wonkity.com (localhost [127.0.0.1]) by wonkity.com (8.13.8/8.13.8) with ESMTP id l1E50arG002638; Tue, 13 Feb 2007 22:00:36 -0700 (MST) (envelope-from wblock@wonkity.com) Received: from localhost (wblock@localhost) by wonkity.com (8.13.8/8.13.8/Submit) with ESMTP id l1E50ajm002635; Tue, 13 Feb 2007 22:00:36 -0700 (MST) (envelope-from wblock@wonkity.com) Date: Tue, 13 Feb 2007 22:00:36 -0700 (MST) From: Warren Block To: Bob In-Reply-To: <20070213174754.088e97b9@tania.servebbs.org> Message-ID: <20070213215329.G2526@wonkity.com> References: <20070213172123.620e32b3@tania.servebbs.org> <45D23AD3.4060506@makeworld.com> <20070213174754.088e97b9@tania.servebbs.org> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (wonkity.com [127.0.0.1]); Tue, 13 Feb 2007 22:00:36 -0700 (MST) Cc: freebsd-questions@freebsd.org Subject: Re: Forcing a portupgrade? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Feb 2007 05:00:37 -0000 On Tue, 13 Feb 2007, Bob wrote: > On Tue, 13 Feb 2007 16:41:29 -0600 > Paul Schmehl wrote: > >> Yikes! That's a bit drastic. What's wrong with make >> DISABLE_VULNERABILITIES install? > > Where would I find the documentation on all the possible command-line > options to make? IE, where is DISABLE_VULNERABILITIES documented? man ports ISTR using it with portupgrade with the -M option. A probably-better way to fix the vulnerabilities of Mozilla is to switch to the newest version, which is now called Seamonkey. > I am sure I would have occasion to use others if I knew what and where > they were. Also in the ports man page. Other targets also avoid brute-force removal of files, like rmconfig. -Warren Block * Rapid City, South Dakota USA